Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
Ecosystems
Resiliency
resilience
pubcrawl
multifactor authentication
Metrics
IT industry
hybrid cryptographic system
Human Factors
human factor
Human behavior
HCS
encryption
authentication
Data Security
data privacy
CSP
Cryptography
CloudSim simulator
CloudSim
cloud service providers
cloud security ecosystem
Cloud Security
Cloud Computing
cloud adoption
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
privacy
Measurement
mKDCA feature-map
mobile computing
mobile sensing
multi-kernel learning
multikernel discriminant-component selection
multiple Kernel Discriminant Component Analysis feature-map
Mutual information
pattern classification
machine learning
privacy-aware classification
privacy-preserving classification
pubcrawl
Redundancy
resilience
Resiliency
Scalability
utility classification performance
Human behavior
Artificial Intelligence
Compressive Privacy
data privacy
Differential mutual information
Differential Mutual Information (DMI)
DMI forward search method
feature engineering
Fisher's discriminant analysis
high-quality predictor
AI
human factor
Human Factors
incremental forward search
Kernel
Kernel Discriminant Component Analysis (KDCA)
kernel selection
Kernels
learning (artificial intelligence)
biblio
Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
Laplace Mechanism
training steps
Training
Scalability
Resiliency
resilience
pubcrawl
privacy budget consumption
privacy
Neurons
neural nets
machine learning
loss functions
learning (artificial intelligence)
Laplace transforms
adaptive Laplace mechanism
Human Factors
human factor
Human behavior
differential privacy preservation
differential privacy
deep neural networks
deep learning
data privacy
Computational modeling
Biological neural networks
Artificial Intelligence
AI
affine transforms
affine transformations
biblio
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
resilience
novel efficient encryption scheme
privacy
privacy-preserving framework
privacy-preserving methods
privacy-preserving visual learning
private data
private information
pubcrawl
multiple classifiers
Resiliency
Scalability
sparse data
Videos
visual classifiers
visual recognition methods
visualization
homomorphic cryptosystem
Artificial Intelligence
computer vision
Cryptography
data privacy
Distributed databases
doubly permuted homomorphic encryption
encryption
high-dimensional data
AI
Human behavior
human factor
Human Factors
Image Processing
learning (artificial intelligence)
learning procedure
leveraging distributed private image data
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
Random Projection Data Perturbation Based Privacy Protection in WSNs
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
PPND algorithm
wireless sensor networks
telecommunication security
Sparse projection data perturbation
Sparse matrices
SMART algorithm
security
Resiliency
random projection data perturbation based privacy protection
pubcrawl
privacy protection requirements
privacy preserving
pre-distribution random number
Algorithm design and analysis
node privacy
Network reconnaissance
network coverage area
data traffic
data privacy protection mechanism
data privacy
Data integration
data fusion technology
data fusion algorithm
data fusion
Conferences
« first
‹ previous
…
86
87
88
89
90
91
92
93
94
…
next ›
last »